Lecture 1 - Introduction Flashcards
aaaa (11 cards)
What are the 2 steps of the HTTPS protocol?
- Key exchange: Generation of a shared key using asymmetric cryptography
- Secure communication: Secure communication with the help of the shared key using symmetric cryptography
Explain secure multi-party computation
In the center there is a trustworthy party, other parties send their xi (let’s say for example there are 3), the trustworthy party calculates the y=f(x1,x2,x3) and sends it to all parties, this key will be used to encrypt messages.
What’s the secure multi-party theorem
Each trusted party can be realized by a protocol.
What’s the basic idea of an encryption scheme?
both actual parties have a secret key (k), sending party encrypts the message using the secret key and transfers the ciphertext, if the ciphertext is taken, without the key it cannot be deciphered, the receiver gets the ciphertext, deciphers it using the secret key k, and reads the message
Explain the syntax of a symmetric cipher
An encryption scheme is a tuple (Gen, Enc, Dec) where
Gen: Probabilistic key generation algo, which takes as input 1^n and returns key k.
Enc: Encryption algo that takes input k and message m ∈ M and outputs 𝐜 ∈ C. We write c <– Enck(m)
Dec: Decryption algo gets as input the key k and ciphertext c and outputs the message m. Write m = Deck(c)
Spaces:
K - Keyspace
M - Plaintext space
C - Ciphertext space
Correctness: for each k and m holds: Deck(Enck(m)) = m
What is kerckhoffs principle?
The cipher should remain secure, even if the attacker knows the cipher algo (i.e. attacker knows (Gen, Enc, Dec).
The only thing that is secret is a short key k, which is chosen at random.
Why kerchkhoffs principle?
- In commercially used products, it is difficult to keep the specification secret (reverse engineering).
- Short keys are easier to protect, to create and to exchange
- The security of the design can be analyzed publicly.
What is the shift cipher
Shifting each letter by k places in the alphabet
How can we break substitution ciphers?
Substitution ciphers have a fixed mapping for each letter to another letter/symbol, but a statistical approach may be used.
If we know the most used letter in the eng alphabet and we know the message is in english, we can compare and decipher that way.
What are the 3 principles of modern cryptography?
- Formal definition - security must be precisely defined (sec goals, comparison between schemes, security proofs). Has 2 components (Goals of the adversary, adversary model)
- Construction (of a crypto scheme) - Construction of complex crypto scheme from simple crypto primitives, sometimes based on number-theoretical assumptions, design of base primitives should always be left to experts.
- Sec Analysis - Proof of security of the construction: carrying out a reduction
- First try: Test security against all attacks
- Not possible: There are too many attacks!
- Second try: Security based on an assumption
- Reduction proof: The only way to break the cryptoscheme is to break the assumption